City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 198.145.121.0 - 198.145.121.255
CIDR: 198.145.121.0/24
NetName: DATAR-6
NetHandle: NET-198-145-121-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Data Room, Inc (DATAR-6)
RegDate: 2023-05-30
Updated: 2024-08-26
Ref: https://rdap.arin.net/registry/ip/198.145.121.0
OrgName: Data Room, Inc
OrgId: DATAR-6
Address: 3418 Northern Blvd, Suite 408
City: Long Island City
StateProv: NY
PostalCode: 11101
Country: US
RegDate: 2006-02-06
Updated: 2021-09-15
Ref: https://rdap.arin.net/registry/entity/DATAR-6
OrgAbuseHandle: NETWO1108-ARIN
OrgAbuseName: Network Operations
OrgAbusePhone: +1-646-201-4076
OrgAbuseEmail: support@serverroom.net
OrgAbuseRef: https://rdap.arin.net/registry/entity/NETWO1108-ARIN
OrgTechHandle: NETWO1108-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-646-201-4076
OrgTechEmail: support@serverroom.net
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO1108-ARIN
OrgDNSHandle: SBO58-ARIN
OrgDNSName: Botez, Stefan
OrgDNSPhone: +40751257259
OrgDNSEmail: stefan@serverroom.net
OrgDNSRef: https://rdap.arin.net/registry/entity/SBO58-ARIN
OrgDNSHandle: COCEI-ARIN
OrgDNSName: Cocei, Andi
OrgDNSPhone: +40770437239
OrgDNSEmail: andi@serverroom.net
OrgDNSRef: https://rdap.arin.net/registry/entity/COCEI-ARIN
OrgNOCHandle: NETWO1108-ARIN
OrgNOCName: Network Operations
OrgNOCPhone: +1-646-201-4076
OrgNOCEmail: support@serverroom.net
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO1108-ARIN
OrgRoutingHandle: COCEI-ARIN
OrgRoutingName: Cocei, Andi
OrgRoutingPhone: +40770437239
OrgRoutingEmail: andi@serverroom.net
OrgRoutingRef: https://rdap.arin.net/registry/entity/COCEI-ARIN
OrgRoutingHandle: SBO58-ARIN
OrgRoutingName: Botez, Stefan
OrgRoutingPhone: +40751257259
OrgRoutingEmail: stefan@serverroom.net
OrgRoutingRef: https://rdap.arin.net/registry/entity/SBO58-ARIN
OrgTechHandle: COCEI-ARIN
OrgTechName: Cocei, Andi
OrgTechPhone: +40770437239
OrgTechEmail: andi@serverroom.net
OrgTechRef: https://rdap.arin.net/registry/entity/COCEI-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.145.121.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5030
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;198.145.121.150. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026020500 1800 900 604800 86400
;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 05 21:23:36 CST 2026
;; MSG SIZE rcvd: 108
150.121.145.198.in-addr.arpa domain name pointer enforce.de.com.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
150.121.145.198.in-addr.arpa name = enforce.de.com.
Authoritative answers can be found from:
| IP | Type | Details | Datetime |
|---|---|---|---|
| 60.250.159.53 | attackbotsspam | Unauthorized connection attempt from IP address 60.250.159.53 on Port 445(SMB) |
2020-02-20 21:21:00 |
| 111.225.216.37 | attackspambots | 02/20/2020-05:48:14.316785 111.225.216.37 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433 |
2020-02-20 21:24:12 |
| 116.71.130.253 | attackbotsspam | 20/2/20@08:30:39: FAIL: Alarm-Network address from=116.71.130.253 ... |
2020-02-20 21:35:34 |
| 47.90.22.78 | attackspam | WordPress login Brute force / Web App Attack on client site. |
2020-02-20 21:42:10 |
| 154.160.9.136 | attackspambots | Email rejected due to spam filtering |
2020-02-20 21:48:02 |
| 180.121.73.48 | attackspam | Feb 20 13:28:05 l03 postfix/smtpd[2270]: lost connection after AUTH from unknown[180.121.73.48] Feb 20 13:28:08 l03 postfix/smtpd[2270]: lost connection after AUTH from unknown[180.121.73.48] Feb 20 13:28:24 l03 postfix/smtpd[2270]: lost connection after AUTH from unknown[180.121.73.48] Feb 20 13:28:31 l03 postfix/smtpd[2270]: lost connection after AUTH from unknown[180.121.73.48] Feb 20 13:28:39 l03 postfix/smtpd[2270]: lost connection after AUTH from unknown[180.121.73.48] Feb 20 13:28:42 l03 postfix/smtpd[2270]: lost connection after AUTH from unknown[180.121.73.48] Feb 20 13:28:48 l03 postfix/smtpd[2270]: lost connection after AUTH from unknown[180.121.73.48] Feb 20 13:28:50 l03 postfix/smtpd[2270]: lost connection after AUTH from unknown[180.121.73.48] Feb 20 13:28:59 l03 postfix/smtpd[2270]: lost connection after AUTH from unknown[180.121.73.48] Feb 20 13:29:08 l03 postfix/smtpd[2270]: lost connection after AUTH from unknown[180.121.73.48] |
2020-02-20 21:40:57 |
| 113.188.16.26 | attackbotsspam | Honeypot attack, port: 81, PTR: static.vnpt.vn. |
2020-02-20 21:31:23 |
| 113.53.4.183 | attackbotsspam | Honeypot attack, port: 445, PTR: PTR record not found |
2020-02-20 21:26:31 |
| 82.64.206.237 | attackbots | Feb 20 10:23:54 amit sshd\[4656\]: Invalid user asterisk from 82.64.206.237 Feb 20 10:23:54 amit sshd\[4656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.64.206.237 Feb 20 10:23:56 amit sshd\[4656\]: Failed password for invalid user asterisk from 82.64.206.237 port 36118 ssh2 ... |
2020-02-20 21:12:54 |
| 91.233.246.22 | attackspam | Telnet Server BruteForce Attack |
2020-02-20 21:27:08 |
| 157.37.221.187 | attackspambots | Unauthorized connection attempt from IP address 157.37.221.187 on Port 445(SMB) |
2020-02-20 21:18:29 |
| 200.108.131.11 | attackbotsspam | Unauthorized connection attempt from IP address 200.108.131.11 on Port 445(SMB) |
2020-02-20 21:36:13 |
| 120.131.3.91 | attackspambots | Invalid user john from 120.131.3.91 port 3322 |
2020-02-20 21:11:29 |
| 45.187.164.1 | attack | 45.187.164.1 - - [20/Feb/2020:03:52:22 +0200] "GET /setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=busybox&curpath=/¤tsetting.htm=1 HTTP/1.1" 400 226 |
2020-02-20 21:14:00 |
| 117.4.92.254 | attackbotsspam | Automatic report - Port Scan Attack |
2020-02-20 21:46:21 |